Source: abseil Version: 20230802.1-4 Severity: important Tags: security upstream X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org> Control: found -1 20220623.1-1
Hi, The following vulnerability was published for abseil. CVE-2025-0838[0]: | There exists a heap buffer overflow vulnerable in Abseil-cpp. The | sized constructors, reserve(), and rehash() methods of | absl::{flat,node}hash{set,map} did not impose an upper bound on | their size argument. As a result, it was possible for a caller to | pass a very large size that would cause an integer overflow when | computing the size of the container's backing store, and a | subsequent out-of-bounds memory write. Subsequent accesses to the | container might also access out-of-bounds memory. We recommend | upgrading past commit 5a0e2cb5e3958dd90bb8569a2766622cb74d90c1 If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2025-0838 https://www.cve.org/CVERecord?id=CVE-2025-0838 [1] https://github.com/abseil/abseil-cpp/commit/5a0e2cb5e3958dd90bb8569a2766622cb74d90c1 Regards, Salvatore